Fathers and Sons of the Digital Millennium: Another Brick in the Wall
The emergence of the Internet not only connected nations and continents in a globalized rush, but also inserted its small brick into the eternal wall separating fathers and children, as…

Continue reading →

From birch bark to hosting: How information storage has evolved with the development of humanity
Since ancient times, people have tried to keep information known to them - both for themselves and for posterity. At first, the methods of preserving information were the most primitive,…

Continue reading →

Adobe for web developers
Adobe has no need for a special presentation - it is very well known among almost all users who have ever dealt with graphics processing. Of course, we are talking…

Continue reading →

5 rules to help protect yourself from cybercriminals

Today, the problems of cyber defense have become more acute in society. The level of crimes related to the theft of personal data is growing from year to year in all countries of the world. Sometimes it seems that it is impossible to defend against hackers. But in reality this is far from the case. Here are five very simple but useful tips that will help add a couple of points to your level of security on the web.

1. Do not trust “friends”
Today, hackers do not shy away from creating entire fake pages, posing as those who are not. In some cases, the attackers are willing to spend many weeks studying their victims and spending months on the realization of a cunning plan. Finding all the necessary information about a potential “client” for them is not difficult. That is why you should not once again trust on the Web people who you do not know personally in real life.

2. Timely update
Regular and timely updating of all software on a computer is almost a third of PC protection against hacker attacks. It is best to put a tick everywhere in the “automatic update”. Worse from this will not be exact. However, for this you should use only licensed programs. But you do, right? If not, then it’s time to start, since there is no desire to mine for just a cryptocurrency for someone.

3. The correct passwords
Most people, despite all the warnings, use the same passwords for different services. This is an absolutely wrong approach. Each password must be strictly unique and must not be cognitive. It is best to create passwords using a generator from a set of random characters. Remember that rearranging parts of the password in some places or replacing a couple of characters will not help protect against hackers.

4. Trust, but … do not trust
When it comes to cyber security, it’s best to be guided by the same principle as all large companies, namely the principle of “zero trust”. This means that when it comes to protecting your data you can not trust anyone or anything by default. Implementing this principle in everyday life can be very difficult, but you should definitely try.

5. All troubles from people
Always remember that the main threat to cyber security is not viruses and spam emails, but the people around us. Very often, in order to invade personal digital space, you do not need to hack anything and infect with viruses, sometimes it is enough for attackers to be behind you and just peep the password and login. This is another reason always and in any situation to observe increased vigilance.

Want more interesting things? How about learning about 17 more clever tricks that all experienced parents use to get along peacefully with the kids, making their lives easier.

7 ways to make sure that the Internet knows everything about everyone
Modern technology really knows no boundaries. With the development of the Internet, information has become worth its weight in gold. Confidentiality has become another important value in our world. And…

...

How to understand that someone is following our correspondence on the web and take all necessary measures
In recent years, there are more and more scandals associated with data leakage on the Web and spying on people - both for individuals and for companies or even states.…

...

Telegram lock and deadline for memes: 5 of the loudest scandals of the IT industry lately
Last year was rich in various scandals in the world of information technology. What is it worth blocking Telegram Roskomnadzor messenger or data leakage of 87 million Facebook social network…

...

The whole truth about the & nb p; Network
In no country in the world is a well-known software maker reconciled with the emergence of domains, including its name or trademarks belonging to it. This was the case with…

...